Am Montag, dem 17.05.2021 um 16:04 -0500 schrieb Darin Pettis:
> Hi Stephen,
> Thanks for the quick reply as I know it is getting late in Ireland. 
> 
> I’m sure you do remember the conversation as you spent a lot of time
> at the microphone around it.  :-)
> 
> It is certainly not an easy question to answer but this group
> comprises the smartest people that I know!!  Surely someone must be
> up for the challenge as fully half of the people in that London hall
> voiced the need for it.  Furthermore, when the day comes that TLS 1.2
> can’t be used anymore, for whatever the reason, this need is going to
> come racing down the tracks…
> 
> So, while everyone is breathing easy right now, it would be great to
> address the need proactively.  
> 

In my eyes the problem (use case) statement is a bit dishonest in this
context. Enterprises need control over data. What this proposal tries
to offer though is snooping/eavesdropping. And control is proxy (mitm)
when you openly and actively control data flow and do not pretend that
you are not here.

In addition to already mentioned integrity leakage via cookie this
proposal also compromises other security (integrity) controls such as
TLS channel binding.

And again it pretends to be opt-in but in the landscape of current
base-line threat-model it's just an invitation to exploit it (send/leak
the keys to malicious party).

Regards,
Ruslan

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to